解碼開關 的英文怎麼說

中文拼音 [jiěkāiguān]
解碼開關 英文
decoding switch
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ動詞1 (使開著的物體合攏) close; shut 2 (圈起來) shut in; lock up 3 (倒閉; 歇業) close down...
  • 解碼 : decoding; decipher; decode
  1. Ajl those drictions supp1ied by thes system help us resolve the problern of managing aluxninuin type materials drawings. at the sazne hme, it makes the exploitation and design ofproduc has better inherit by utilising the functions of coding based on the software. as thes systern app1ied the classiforg and coding prinop1e based on gt and cad tedm1ogy in design and managernen of drawings which not only enhance the design quality of product, shorten the development pedod but also decrease the ropeaed drawing work and hanme the method of protract drwings

    該系統規范了型材圖紙的設計,提高了型材圖紙的檢索效率,對型材的相信息進行了的效的管理,良好地決了鋁型材圖紙檢索和管理的問題;同時,作為一個計算機輔助產品設計系統,利用該系統的分類檢索功能和圖紙支撐軟體的圖形編功能,使產品的發設計具有良好的繼承性。
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令載送到一指定頻率點。終端收費控制器調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據調器送來的信號,送入cpu單元后,出不授權信號,然後向斷部分送入信號,斷部分利用pin二極體的寬帶工作能力以及斷特性,實現對非授權用戶或者非法用戶的信號斷,使之不能正常收視,繳費用戶進行通正常收視,達到控制用戶通道的管理。
  3. The protocol specifies the definition of inter - library loan service working on c / s mode. by means of 21 apdu messages defined in this protocol and standard encode / decode rule, we can realize the resource sharing between different libraries. this article advances a set of solution scheme for the implementation of inter - library loan on the internet environment, and gives some discussion about the key elements for the implementation which includes the process of apdu, the computer descriptions of asn. l syntax, the ber coding rules and the design for supporting db etc. the exact method and program for implementation of inter - library loan are also presented in the article

    本文在詳細分析和研究館際互借協議內容和工作原理基礎上,根據我國圖書館目前的實際情況,給出了在internet環境下實現館際互借服務的決方案,論述了基於windows2000操作系統下發館際互借軟體的具體思路,討論了實現該協議的一些鍵問題,包括apdu的處理, asn . 1抽象語法表示、 ber編規則、數據庫設計等,並給出了具體的決方法和實現程序。
  4. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改進方案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有決方案的基礎上提出一綜合性的方案,其中包括無線鏈路的高誤率和連接斷問題的決,並重點對方案中出現的交叉層問題進行分析和模擬;其二,考慮的是分散式網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控制和差錯恢復機制,在此基礎上提出了一種採用非反饋機制的決方案,重點對方案中的鍵參數進行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc網路中tcp的性能。
  5. " although the simplest model for a cn affecting gene actiity is where the ariant is a deletion of a gene or part of a gene, we found examples where actiity is affected from a distance, " commented barbara stranger, first author and post - doctoral fellow at the wellcome trust sanger institute. " this may occur when the cn reduces the effectieness of a region that works to switch the genes on or off

    變異拷貝數機制能通過改變特定基因的「劑量」 (即復制后的拷貝數量) ,藉助于裂某個包含后續可翻譯成蛋白質密的基因的活性片斷或藉助于降控制基因活性即類似/及在我們基因組中的調整的基因組中具有調控作用的基因片斷來影響基因活性。
  6. The holy key to the gates of heaven that unlocked our wisdom, it is the secret code for smooth passage through the series of roadblocks on the path to eternal liberation

    天國之門的聖鑰,啟我們智慧的大門,通過層層卡的密,暢行無阻,永恆脫。
  7. Although stb just is a sort of terminal equipments of the tv signal transmission system, however pivotal technique involves the data demodulation, channel decode, transport stream de - multiplexing, audio and video signal decompression technique and real - time software technique with upriver data coding technique etc. therefore, software and hardware technology research and development of stb, which can increase usefulness with dependable of digital video signal and audio signal for study later make the theories preparation and backlog experience

    機頂盒雖然只是數字電視傳輸系統的終端設備,但所用到的鍵技術涉及到數據調、通道、傳輸流的復用、音視頻信號壓縮技術以及實時軟體技術和上行數據的編技術等。因此,通過對機頂盒軟、硬體的研究發,既能為以後研究如何提高信息傳輸的有效性和可靠性作理論上的準備,也為圖像信號和音頻信號的數字化處理積累經驗。
  8. Dynamic segmentation technology is used to resolve the mutual operation problem between fixed spatial element and abundant attribute data, thus favorable foundation is formed to develop hngis with full functions. ( 2 ) this paper systematically analyzes the characteristics of traffic transit in highway network, explains the relative problems about inquire for the optimal route in highway network. it analyzes the factors affecting users making choice, determines the choice object of transit route : integrated evaluation system of link impedance is formed

    系統分析了公路網空間實體集以及它們之間的系,提出了公路網gis數據的具體組織方法,其中涉及到信息圖層空間劃分、公路網gis數據編、數據庫的設計等內容:提出採用動態分段( dynamicsegmentation )技術來決固定空間要素與海量屬性數據的聯和互操作問題,為研究發完全功能的公路網gis打下了良好的基礎。
  9. In autoore, a novel approach to extract java semantic relational model is presented. to get precise object relational result, the java code polymorphism invoke location is formal defined and a program analysis method based on extended class hierarchy graph ( echg ) is proposed

    抽取是oore的起點,從起點始支持理是逆向工程的重要目標, autoore在java抽取中,抽取模型採用文中提出的java詞法和語義兩個模型,利用一個基於java擴展類層次圖( echg )的多態調用點分析演算法,得到更精確的靜態對象系。
  10. Applying singlechip in the receiving system, this method can make the best of singlechip ' s resource of software and hardware and provide a reasonable and cheap resolving project for wireless remote control

    在發射系統中採用十進制至8421器實現對按鍵編址,從而對受控電路進行選擇控制;在接收控制系統中引入單片機,通過充分利用其軟、硬體資源,為無線電遙控提供了合理、廉價的決方案。
  11. Secondly, on the basis principles of mis and erp, combining the design and development of the management information system of the industrial company of green hill in chongqing ( qsmis ), basing the foundations of system and demands analyzing, it carried on more detailed argumentations of module designing, data system, network and structure of system, modes of calculation etc. especially, it gave the discussing about flow rebuilding, technology of coding, interface designing, and system optimizing. at the same time, it expatiated the safety precautions of system, and explained the main ability and effects of system by the overall frames and charts of system ' s structure, and every logic flow chart of module of function of qsmis briefly

    其次,在充分理mis和erp原理基礎上,結合重慶青山工業公司管理信息系統( qsmis )的設計和發,在系統需求分析的基礎上,對系統的功能模塊、數據庫系統、網路拓撲及體系結構、計算模式等進行了較詳細的論述;尤其是對系統發中實施的業務流程再造、編技術、界面設計、及系統優化等鍵技術進行了較為系統的探討,同時對系統所實施的安全策略進行了闡述;並通過設計出的qsmis的總體框架以及系統結構圖、各功能模塊的邏輯流程圖,對系統實現的主要功能和作用作了簡要概述。
  12. In the chapter 2, the thesis introduces the key technologies : technology of multithreading, communication between procedures, network communication, the message simulation of mouse action and keyboard in windows 2000 system, capturing the screen of remote computer, the encoding and decoding of images and so on. these are discussed in detail : the selection of network communication protocol, the principle of winsock network programme and the important api functions

    第二章介紹了本系統採用的鍵技術:多線程技術、進程間通訊技術、網路通訊技術、 windows系統的鼠標和鍵盤消息模擬技術、屏幕抓取技術、圖像編技術等。同時介紹了網路通信協議的選擇、 winsock的網路編程基本原理和一些在軟體發過程中用到的網路編程介面函數。
  13. " to learn about an open source junit test tester

    」 ,了放源代junit測試測試器的知識。
  14. For more information about using managed code to develop solutions using office applications, see the following technical articles

    使用託管代發使用office應用程序的決方案的更多信息,請參見下面的技術文章:
  15. To improve performance, you may wish to factor out the code for each model attribute into its own method or a single method with a " switch "

    要改進性能,您可能希望將每個模型屬性的代成其自己的方法(或者是一個帶有「( switch ) 」的方法) 。
  16. In this dissertation, an embedded video monitoring system based on network is studied deeply, and then implemented the hardware device drivers to the chip of the vweb company ’ s vw2010. the design is based on the mpeg - 4 technology and embedded linux. the first three chapters of the thesis are to study the video surveillance system ’ s current background, main hardware structure and the main functions of software molds

    本論文的重點:研究了網路視頻監控系統的基本硬體體系結構和軟體功能模塊,提出了一種使用晶元vw2010來實現視音頻硬編的驅動程序設計方法,該設計基於當前最流行的mpeg - 4編技術和源的嵌入式linux操作系統;接著介紹了基於晶元vw2010的能兼容多語言的osd界面設計的幾個鍵技術;論文最後給出了嵌入式linux下控制多種雲臺鏡頭的研究結果和設計方案。
  17. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為發平臺,採用c作為發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的,實現了基於埠掃描等檢測的預處理功能,對基於鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  18. On the contrast, h. 323 is a mature _ developed system, which is distinguished as centralized management to support multipoint conference. mcu is the center in the system with the endpoint transparent to the management mechanism

    323發展的較為成熟,它的特點是以mcu為中心建立集中式管理,支持多點會議的召,而集中管理方式對用戶透明,用戶心的只是多媒體的壓縮編,便於建立瘦客戶端的系統,維護更為集中簡潔。
  19. During the process of voice terminal design, the author firstly presents its hardware structure, including the coding and encoding module of ip, the interface to former access network equipment and etc, and then the author illustrates in detail the software realization of g723. 1 & g711 coder and encoder, then introduces how to realize the application of rtp / rtcp protocol in h. 323 gateway by openh323, including the design of the process and the realization of the data package format and partial code

    在語音終端設計中,首先提出了其硬體構架,包括ip語音編模塊,與原接入網設備的介面等;然後重點討論了g . 723 . 1和g . 711編器的軟體實現。在h . 323網模塊中,首先討論了ip電話網的系統架構;接下來介紹了openh323軟體發包,並詳細介紹了利用openh323實現rtp / rtcp協議在h . 323網中的應用,包括流程設計,數據包格式和部分代實現。
  20. Due to intellectual asset in the form of copyright and / or patent, there are no available rs coding and decoding modules for calling for in scientific research exploitation. furthermore, the configuration and algorithm are rather complicated. it is demanding to fulfill this part of module unit based on fpga and to form the kernel for calling for

    由於知識產權的系,在科研發中沒有現成的rs編模塊可供調用,而有結構和演算法又較為復雜,因此迫切需要在fpga (現場可編程門陣列)上完整實現這部分模塊單元,並形成可供調用的內核。
分享友人